Most IT pros prefer open source to proprietary software
Business continuity and control eclipse cost savings are the top reasons why U.S. IT professionals prefer open source to proprietary software. According to a Ponemon Institute …
Whitepaper: Zero Trust approach to network security
NOTE: This whitepaper is no longer available, thanks for your interest. Zero Trust is an alternative security model that addresses the shortcomings of failing …
New Synology NAS optimized for encryption and intensive tasks
Synology introduced its newest Plus series DiskStations, the DS1515+ and DS1815+. Both multi-bay NAS servers are designed to facilitate intensive data exchange, collaboration, …
Sophisticated Android-based botnet a danger to enterprise networks
A new, more sophisticated and more stealthy version of the NotCompatible Android Trojan continues to strengthen one of the most long-lived and advanced mobile botnets ever to …
Google open sources Firing Range, a test tool for web app security scanners
Google has open sourced another security tool: it’s called Firing Range, and it’s an effective testing ground for a variety of automated web application security …
New non-profit CA aims to make HTTPS use universal
To become ubiquitous, encryption must be easy to set up and easy to use, and that’s why the Electronic Frontier Foundation (EFF), Mozilla, Cisco, Akamai, IdenTrust, and …
Malware Domain Generating Algorithms are becoming more sophisticated
Malware cut off from its C&C servers is effectively useless to its masters, so they are continually trying to find new ways of maintaining that connection at all times. …
320 breaches reported between July and September
Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial …
Overwhelming optimism for information security in 2015
Expectations for data security next year are surprisingly optimistic given the harsh reality of 2014, which has been the worst year on record for data breaches, according to a …
DDoS attacks continue to fall in size and frequency
The newest up-and-coming countries of origin for DDoS attacks will be Vietnam, India and Indonesia in 2015, according to Black Lotus. While these countries don’t have …
One billion attacks were blocked during the third quarter
Over a billion malicious attacks were detected and blocked during the third quarter, according to Kaspersky Lab. One third of Web attacks were carried out using malicious Web …
Whitepaper: CISOs secret weapon for reducing enterprise risk
Security events happen to the best of organizations. Business and data move at lightning-speed, and CISOs have to not only keep pace with current risks, but anticipate future …
Featured news
Resources
Don't miss
- Want fewer security fires to fight? Start with threat modeling
- Build a mobile hacking rig with a Pixel and Kali NetHunter
- Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains
- Connectwise is rotating code signing certificates. What happened?
- Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)